Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime

preview_player
Показать описание
In this talk, we will share reverse engineering results of FaceTime, with a focus on the process of the initialization and connection of a FaceTime call. Along with the attacker-controlled data propagation path, we will discuss different attack surfaces for FaceTime.

By Tao Huang and Tielei Wang

Рекомендации по теме